Business Analyst - Information Security - PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged IdentityManagement, Network Access Control, Secure access service edge Our leading law firm client are currently looking to take onboard a new Business Analyst - Information Security (PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged IdentityManagement, Network Access Control, Secure access service edge) to join their team on a contractual basis. Our client are an extremely laid back and very anti-micromanaged law firm with a fantastic and relaxed collaborative environment, this new Business Analyst - Information Security (PIM, PAM, NAC … SASE, Exabeam, Privileged Access Management, Privileged IdentityManagement, Network Access Control, Secure access service edge) role will join the global PMO for 12 months to support projects within the Cyber Security/Information Security global space. To be considered for this Business Analyst - Information Security(PIM, PAM more »
Essential Functions Take a lead role in the delivery of BAU Identity and Access management operations. Participate in the design, installation, maintenance, upgrades, and troubleshooting of applications and tools directly impacting the InfoSec Identity service deliverables. Active Directory (AD), Azure Active Directory/Entra ID : Analyze, design … Support synchronization and federation between on-premises AD, Azure AD, and Entra ID. Troubleshoot and optimize synchronization processes to maintain consistency across environments. Privileged Management (PIM, PAM, and Endpoint Privilege Management) : Implement time-based and approval-based role activation to mitigate risks associated with privileged accounts. Administer PAM … and manage role-based access control (RBAC) for various systems and applications. Define and enforce group-based access policies to elevate privileges when necessary. Identity Governance and Administration (IGA) : Contribute during phases of design, configuration, deployments, and operations in the area of IAM. Work on access management, identitymore »
Essential Functions Take a lead role in the delivery of BAU Identity and Access management operations. Participate in the design, installation, maintenance, upgrades, and troubleshooting of applications and tools directly impacting the InfoSec Identity service deliverables. Active Directory (AD), Azure Active Directory/Entra ID : Analyze, design … Support synchronization and federation between on-premises AD, Azure AD, and Entra ID. Troubleshoot and optimize synchronization processes to maintain consistency across environments. Privileged Management (PIM, PAM, and Endpoint Privilege Management) : Implement time-based and approval-based role activation to mitigate risks associated with privileged accounts. Administer PAM … and manage role-based access control (RBAC) for various systems and applications. Define and enforce group-based access policies to elevate privileges when necessary. Identity Governance and Administration (IGA) : Contribute during phases of design, configuration, deployments, and operations in the area of IAM. Work on access management, identitymore »
Job Title: Identity and Access Management Analyst Company: Elida Beauty Location: London, UK Contract Length: 6 months - Maternity Cover Salary : £46,500 About Us: Elida Beauty is a very exciting new beauty business that will soon be becoming independent of Unilever. We re-found iconic brands by remixing … deliver outcomes that are music to the ears of consumers, customers, colleagues, and the planet alike. Your Key Responsibilities: Develop, implement, and maintain effective Identity and Access Management (IDAM) processes and governance to ensure the confidentiality, integrity, and availability of our systems and data. Manage identities and access … and access updates. Skills and Requirements: Academic or professional qualifications in Computer Science, Information Technology, or related field. Minimum 2 years of experience in identity and access management, preferably in a cloud environment. Experience with IDAM tools such as Azure AD and Azure PIM. Preferred experience with Oracle more »
Bristow Holland are seeking an experienced and dedicated Identity Access Management Specialist to join our dynamic IT team. This role involves developing processes and procedures to ensure our managed environments maintain the highest levels of availability, security, and quality. You will play a critical role in capacity forecasting … Automate AD health checks and lifecycle management. Administer Quest Change Auditor and AD Certificate Services. Troubleshoot AD replication and MS Entra Connect sync issues. IdentityManagement: Design/manage Identity Lifecycle Management systems. Implement lifecycle processes and support user provisioning. Define access control and support governance …/compliance. Automate identity lifecycle processes. MS Entra Connect: Setup connectors, develop sync rules, and resolve conflicts. Configure password sync, writeback, SSO, and more. O365/MS Entra: Setup/troubleshoot Conditional Access policies. Configure Privileged Identity Manager and Multifactor Authentication. Manage O365 licenses and enterprise app SSO. more »
Employment Type: Permanent
Salary: £65000 - £75000/annum - Offering 100% Work From Home
London, Fenchurch Street, United Kingdom Hybrid / WFH Options
Pearson Whiffin Recruitment Ltd
developing processing procedures to ensure managed environments maintain the highest levels of availability, security, and quality. They follow all set procedures to the change management system. You will also serve as an escalation point and provide guidance and direction for the resolution of escalated issues and/or complex … and Services, Promote/Demote Domain Controllers. AD user migration using ADMT. Support Multiple AD forests and trust between them. Automate AD health checks, Identity Lifecyle management, etc. Setup, configure and administer Quest Change auditor. Setup and review AD health assessments to remediate any vulnerabilities. Setup and support … Active Directory Certificate Services. Troubleshoot AD replication and MS Entra Connect sync issues. Identity Expertise in designing and managing Identity Lifecyle Management systems. Implement Identity Lifecycle processes. Support user provisioning and de-provisioning. Define access control and authorization. Support Identity Governance and Compliance. Develop and more »
the network countries. Support global cyber security team to ensure open Continuous Security Improvement Programme (CSIP's) are managed effectively up to closure. Firewall management Web Proxy management and CASB. Anti-Virus/Malware management Standard, third party and privilege access user management Remediation of external … will be used as evidence during COBIT 5, PCI DSS and Security review, internal and external audits. Required Skills Good knowledge of Information Security Management System (Infrastructure Security Operations). Good knowledge of Azure cloud infrastructure and configuration. Good knowledge in System Centre Configuration Manager, Operations Manager and Virtual … Machine Manager. Good knowledge of Microsoft Exchange online Good knowledge of Azure and on-premises Active Directory Good knowledge of Cyber Incident Management and or Security Forensic experience. Good knowledge of Windows Server and Linux Good knowledge in network (WAN, Wi-Fi) and Network Access Control (NAC) managementmore »
london (city of london), south east england, United Kingdom
Henderson Scott
the network countries. Support global cyber security team to ensure open Continuous Security Improvement Programme (CSIP's) are managed effectively up to closure. Firewall management Web Proxy management and CASB. Anti-Virus/Malware management Standard, third party and privilege access user management Remediation of external … will be used as evidence during COBIT 5, PCI DSS and Security review, internal and external audits. Required Skills Good knowledge of Information Security Management System (Infrastructure Security Operations). Good knowledge of Azure cloud infrastructure and configuration. Good knowledge in System Centre Configuration Manager, Operations Manager and Virtual … Machine Manager. Good knowledge of Microsoft Exchange online Good knowledge of Azure and on-premises Active Directory Good knowledge of Cyber Incident Management and or Security Forensic experience. Good knowledge of Windows Server and Linux Good knowledge in network (WAN, Wi-Fi) and Network Access Control (NAC) managementmore »
deployment of all Microsoft professional services projects and ongoing programmes across the Stridon client base including: Azure services Microsoft 365 services Infrastructure Cyber security IdentityManagement Application To be the subject matter expert on all matters related to Microsoft Solutions including Azure, M365 and Windows Server related services … across the Stridon infrastructure Responsible for deployment, configuring, and management of deliverables across all client solution implementations including ADDS, Certificates, Certificate Authorities, DNS, DHCP, DFS, File System, Group Policy, Radius, Exchange, SharePoint, Federation, Web Services and SQL Provide subject matter expertise and manage Stridon internal applications Manage Remote Management and Monitoring tools to respond to and remediate problems where they have been escalated Deploy vulnerability management tools such as Microsoft Defender to scan for and remediate vulnerabilities across client infrastructure Provide expertise and mentoring to Managed Services engineers in problem management of Microsoft solutions and service more »
within the public sector. This security expert will be working with highly sensitive data, learning new technologies and solving complex technical problems for their identity governance and access management on a Sailpoint application modernisation project. Responsibilities: Technical design & implementation of enterprise IAM solutions Software deployment Change management … software development Delivering against deployment delivery model Working in an agile environment Required Active HO SC clearance Expert in IAM – with a focus on identity governance Strong background using Sailpoint Desired Sailpoint IDN CyberArk Microsoft Entra ID Microsoft AD ServiceNow Access management module more »
london, south east england, United Kingdom Hybrid / WFH Options
Montash
within the public sector. This security expert will be working with highly sensitive data, learning new technologies and solving complex technical problems for their identity governance and access management on a Sailpoint application modernisation project. Responsibilities: Technical design & implementation of enterprise IAM solutions Software deployment Change management … software development Delivering against deployment delivery model Working in an agile environment Required Active HO SC clearance Expert in IAM – with a focus on identity governance Strong background using Sailpoint Desired Sailpoint IDN CyberArk Microsoft Entra ID Microsoft AD ServiceNow Access management module more »
a week and will require travel to local sites/data centres and other office locations. Skills/Experience; Good knowledge of Information Security Management System (Infrastructure Security Operations). Good knowledge of Azure cloud infrastructure and configuration. Good knowledge in System Centre Configuration Manager, Operations Manager and Virtual … Machine Manager. Good knowledge of Microsoft Exchange online Good knowledge of Azure and on-premises Active Directory Good knowledge of Cyber Incident Management and or Security Forensic experience. Good knowledge of Windows Server and Linux Good knowledge in network (WAN, Wi-Fi) and Network Access Control (NAC) management … security monitoring, orchestrator and SEIM tools Good Knowledge of next-gen application firewalls, anti-malware, cloud proxies and CASB Experience in Azure cloud and identitymanagement solutions. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience Azure Entra ID more »
and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of Privileged Access Management processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, IdentityManagement policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an Employment Business in more »
London, England, United Kingdom Hybrid / WFH Options
iO Associates - UK/EU
AWS and Azure environments. Essential Responsibilities and Requirements: Proven "Hands on" experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux and applications/middleware technologies/platforms Familiarity with Active Directory structures and IdentityManagement policies and processes Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience facilitating business process design as … tasks. Capability to organise and prioritise tasks Strong interpersonal skills to establish/maintain relationships and interact with team members Strong organisation and time management skills Strong analytical and problem solving skills more »
london, south east england, United Kingdom Hybrid / WFH Options
iO Associates - UK/EU
AWS and Azure environments. Essential Responsibilities and Requirements: Proven "Hands on" experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux and applications/middleware technologies/platforms Familiarity with Active Directory structures and IdentityManagement policies and processes Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience facilitating business process design as … tasks. Capability to organise and prioritise tasks Strong interpersonal skills to establish/maintain relationships and interact with team members Strong organisation and time management skills Strong analytical and problem solving skills more »
may well not sit with just one candidate so will accept applications which cover a wide range of the skillsets. Position Title: Privileged Access Management - PAM (CyberArk) Consultant/Implementation Engineer Clearances: CyberArk CDE, Sentry, Defender(minimum) Role Summary: The role will be responsible, as part of the CC … of 2 completed deployments. Essential Responsibilities and Requirements: Proven "Hands on" experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux and applications/Middleware technologies/platforms Familiarity with Active Directory structures and IdentityManagement policies and processes Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience facilitating business process design as more »
Competencies: • Previous demonstrable experience in designing, implementing, and managing enterprise level solutions. • At least 5 years of experience in infrastructure engineering, within the asset management or financial services sector. • Strong knowledge of identitymanagement concepts, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based … knowledge and familiarity of Office 365, PowerBI, ADD (Entra), Intune, Azure Fundamentals, the wider Microsoft Server and Application stack and Hyper-V and VMware management principles. • Proficiency in cloud specific networking technologies, server and storage systems, and cloud infrastructure (such as AWS or Azure). • Solid understanding of cyber more »
includes the provision of escalation security support to the Service Desk, Desktop Support, participation in Infrastructure Security projects and being responsible for Information Security Management System (ISMS) maintenance. Key Responsibilities/Accountabilities Taking responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity … centre or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identitymanagement solutions. Specific focus on network equipment. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and … SSO & MFA gateway Data loss prevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools TenableOne or enterprise vulnerability management tools Sound knowledge of industry best practices such as OWASP, Cyber security framework and NCSC guidance more »
includes the provision of escalation security support to the Service Desk, Desktop Support, participation in Infrastructure Security projects and being responsible for Information Security Management System (ISMS) maintenance. Key Responsibilities/Accountabilities Taking responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity … centre or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identitymanagement solutions. Specific focus on network equipment. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and … SSO & MFA gateway Data loss prevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools TenableOne or enterprise vulnerability management tools Sound knowledge of industry best practices such as OWASP, Cyber security framework and NCSC guidance more »
Cloud Security Engineer - Contract (Outside IR35) London (Hybrid) - Up to £500p/day We are seeking an experienced Cloud Security Engineer skilled in identity and access management. Your responsibilities will encompass the design, implementation, and management of cloud security solutions. You'll also be dealing directly with their … internal security and cloud teams to guarantee secure identitymanagement across multiple platforms, including Active Directory, Entra ID, and GCP. Responsibilities: Develop automation scripts and tools for IAM tasks using Go or Kotlin. Automate infrastructure using IaC tools (Terraform experience is a plus). Apply DevSecOps principles with … GCP, Kubernetes, and vulnerability scanning tools is a plus). Qualifications: More than 5 years of experience in Cloud Security, with a focus on identity and security. Strong proficiency in programming with Go or Kotlin. Hands-on experience with Azure AD/Entra ID and SCIM provisioning. more »
Cloud Security Engineer - Contract (Outside IR35) London (Hybrid) - Up to £500p/day We are seeking an experienced Cloud Security Engineer skilled in identity and access management. Your responsibilities will encompass the design, implementation, and management of cloud security solutions. You'll also be dealing directly with their … internal security and cloud teams to guarantee secure identitymanagement across multiple platforms, including Active Directory, Entra ID, and GCP. Responsibilities: Develop automation scripts and tools for IAM tasks using Go or Kotlin. Automate infrastructure using IaC tools (Terraform experience is a plus). Apply DevSecOps principles with … GCP, Kubernetes, and vulnerability scanning tools is a plus). Qualifications: More than 5 years of experience in Cloud Security, with a focus on identity and security. Strong proficiency in programming with Go or Kotlin. Hands-on experience with Azure AD/Entra ID and SCIM provisioning. more »
/Hana for finance and inventory, Success Factors for HR, recruitment and payroll, Oracle Simphony for point of sale (POS), UKG Kronos for workforce management, a new strategic business intelligence architecture, new digital technology for customer loyalty and customer apps, cloud based strategy leveraging MS Azure and SaaS infrastructure … SSP technology strategy; ensuring successful delivery of requirements through the SSP project delivery process. What you'll be doing Assume product ownership for enterprise identitymanagement platform Provide leadership and guidance to regional technology teams (EU, APAC, NA, and establish a strategic relationship with India). Actively support … Lead infrastructure architectural strategy across regional IT teams Skills and Knowledge Essential Experience managing cloud and on prem data centre hosting Network design and management experience Experience in managing end user technologies Experience in presenting technology proposals and influencing both technical and non-technical stakeholders Experience in retail/ more »
Greater London, England, United Kingdom Hybrid / WFH Options
Made Tech
of network security (e.g. OSI, TCP/IP), web application security (e.g. OWASP) and cryptographic controls (e.g. PKI, TLS) Up-to-date understanding of identitymanagement and authentication/authorisation products and patterns Evidence of self-development – we value keen learners Drive to deliver outcomes for users Desire more »